In March, the Payment Card Industry Security Standards Council published Payment Card Industry Data Security Standard (PCI DSS) Version 4.0 to address emerging threats and market changes. PCI DSS v4.0 is set to go into full effect in March 2025, replacing PCI DSS Version 3.2.1. Learn how this will impact your business and what you can do to achieve compliance.
Like its predecessor, PCI DSS v4.0 is centered on 12 requirements that ensure safe transactions at your point of payment (POP) or point of sale (POS) pages. These core requirements did not fundamentally change with the latest release. Instead, v4.0 adds flexibility to implementation, strengthens security standards and necessitates a continuous process to ensure compliance.
There are several enhancements and amendments that might seem simple in theory, but will require significant resources in practice. One such addition is Section 6.4.3. This part of the DCI PSS tightens requirements for payment scripts, setting new regulations for script inventory, script integrity and script authorization — a difficult and significant undertaking, if done manually.
Section 6.4.3 of PCI DSS v4.0 establishes the following requirements for all payment page scripts that are loaded and executed in the consumer’s browser.
In essence, these requirements entail inventorying all code running on your payment pages, explaining the necessity of each and verifying that authorized code has not changed since determined safe. Manually achieving compliance will likely consume a lot of time, money and internal resources. Here’s why:
Under PCI DSS, brands are liable for any exposure of users’ payment data — malicious or otherwise.
Businesses that are not PCI compliant are at greater risk of a digital skimming, Magecart or supply chain attack. This can cause significant financial losses due to the time and resources spent on remediation, lawsuits and bad press. Furthermore, customers, partnering banks and payment processors may end their business with you after a breach.
In addition, PCI DSS can fine companies up to $500,000 per incident, depending on the size of the company and the scope of the violation. Receiving a non-compliance fine can damage customer trust and smear your brand reputation.
By maintaining compliance with PCI DSS 4.0, online businesses can avoid fines and reputation damage. This also instills trust in consumers that their payment data is safe on your site.
Traditional code monitoring solutions can help you comply with PCI DSS v4.0, but most are not sufficient to actually detect and prevent all JavaScript attacks. There is an entire skimming as a service industry selling skimmer kits with malicious scripts that are able to evade traditional detection tools. Some examples:
Achieving PCI DSS compliances requires a comprehensive approach that blends different code mitigation techniques. HUMAN Code Defender offers a combination of behavioral analysis, CSP and granular JavaScript blocking to give website owners complete visibility and control over client-side code.
Code Defender allows website owners to prevent known malicious scripts from loading and transmitting PCI data, and to block third-party JavaScript from accessing sensitive PCI form fields without disabling the entire script. The solution identifies vulnerabilities and anomalous behavior, and proactively mitigates risk, which prevents the theft of PCI data and helps ensure PCI DSS compliance.